Installation¶
Get SuperClaw installed and ready to use.
Requirements¶
| Requirement | Version |
|---|---|
| Python | 3.12+ |
| Package Manager | pip or uv |
Installation Methods¶
Using pip¶
Using uv (Recommended)¶
uv is a fast Python package manager:
From Source¶
Clone the repository and install in development mode:
Optional Dependencies¶
SuperClaw supports optional features through extras:
Verify Installation¶
Check that SuperClaw is installed correctly:
# Show version
superclaw --version
# List available behaviors
superclaw behaviors
# List attack techniques
superclaw attacks
# Show help
superclaw --help
Expected output:
SuperClaw v0.1.1 - Agent Security Testing Framework
Available behaviors:
prompt-injection-resistance [CRITICAL] Tests injection detection
tool-policy-enforcement [HIGH] Tests allow/deny lists
sandbox-isolation [CRITICAL] Tests container boundaries
session-boundary-integrity [HIGH] Tests session isolation
configuration-drift-detection [MEDIUM] Tests config stability
acp-protocol-security [MEDIUM] Tests protocol handling
Development Setup¶
For contributors working on SuperClaw:
Clone and Install¶
Common Development Commands¶
# Sync dependencies
uv sync
# Run tests
uv run pytest
# Run tests with coverage
uv run pytest --cov=superclaw
# Type checking
uv run mypy src/superclaw
# Linting
uv run ruff check src/
# Format code
uv run ruff format src/
# Run CLI
uv run superclaw --help
# Build package
uv build
# Serve documentation locally
uv run mkdocs serve
Pre-commit Hooks¶
Install pre-commit hooks to ensure code quality:
Troubleshooting¶
Python Version Error¶
If you see a Python version error:
Ensure you're using Python 3.12 or later:
Import Errors¶
If you see import errors after installation, try reinstalling:
WebSocket Connection Issues¶
If attacks fail with connection errors:
- Verify the target is running and accessible
- Check the target URL format:
ws://host:port - Ensure firewalls allow the connection
Next Steps¶
- Quick Start โ Run your first security scan
- Configuration โ Customize settings